{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T23:20:58.949","vulnerabilities":[{"cve":{"id":"CVE-2026-25769","sourceIdentifier":"security-advisories@github.com","published":"2026-03-17T18:16:15.267","lastModified":"2026-03-19T17:18:30.560","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Wazuh is a free and open source platform used for threat prevention, detection, and response. Versions 4.0.0 through 4.14.2 have a Remote Code Execution (RCE) vulnerability due to Deserialization of Untrusted Data). All Wazuh deployments using cluster mode (master/worker architecture) and any organization with a compromised worker node (e.g., through initial access, insider threat, or supply chain attack) are impacted. An attacker who gains access to a worker node (through any means) can achieve full RCE on the master node with root privileges. Version 4.14.3 fixes the issue."},{"lang":"es","value":"Wazuh es una plataforma gratuita y de código abierto utilizada para la prevención, detección y respuesta a amenazas. Las versiones 4.0.0 a 4.14.2 tienen una vulnerabilidad de Ejecución Remota de Código (RCE) debido a la Deserialización de Datos No Confiables. Todas las implementaciones de Wazuh que utilizan el modo clúster (arquitectura maestro/trabajador) y cualquier organización con un nodo trabajador comprometido (p. ej., a través de acceso inicial, amenaza interna o ataque a la cadena de suministro) se ven afectadas. Un atacante que obtiene acceso a un nodo trabajador (por cualquier medio) puede lograr RCE completa en el nodo maestro con privilegios de root. La versión 4.14.3 soluciona el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.3,"impactScore":6.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-502"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.14.3","matchCriteriaId":"F2EC01ED-08FD-4617-9001-077F1C246DAF"}]}]}],"references":[{"url":"https://drive.google.com/drive/folders/1WlkKNmHexz8212OVED9O6M_3pI8b6qNI?usp=sharing","source":"security-advisories@github.com","tags":["Broken Link"]},{"url":"https://github.com/wazuh/wazuh/security/advisories/GHSA-3gm7-962f-fxw5","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/wazuh/wazuh/security/advisories/GHSA-3gm7-962f-fxw5","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}